2017
DOI: 10.5815/ijieeb.2017.04.02
|View full text |Cite
|
Sign up to set email alerts
|

Security and Privacy for Data Storage Service Scheme in Cloud Computing

Abstract: Abstract-The cloud computing features aim at providing security and confidentiality to its customers. The business officials have gained maximum profit using the cloud environment. Therefore the critical data moving to and from the cloud server must be secured. The security and confidentiality issue is the most critical challenge that we are facing in today's world of the cloud environment. The business officials have gained maximum profit accessing the cloud environment. Before the disaster occurrence, the cr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…Attackers can disrupt services by sending malicious requests to the server if there are no strong security policies placed, and they can create downtime of the server as the servers can get overloaded through it. For natural disasters, cloud hosting providers can place their data centers at geographical locations so that if one center gets affected, another will pick up and prevent downtime of services [24].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Attackers can disrupt services by sending malicious requests to the server if there are no strong security policies placed, and they can create downtime of the server as the servers can get overloaded through it. For natural disasters, cloud hosting providers can place their data centers at geographical locations so that if one center gets affected, another will pick up and prevent downtime of services [24].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Therefore, the time and cost required for the decryption and storage cost for the cipher text are reduced [9]. The information's that are shared in the computer systems are secured by the utilization of a powerful tool known as cryptography [10,11]. Numerous cryptographic algorithms are utilized for granting required security to the data transferred to the bank, while using home banking by a browser n a computer.…”
Section: Introductionmentioning
confidence: 99%